Title :
Converters for Designing Applied Cryptographic Protocols
Author :
Huawei, Zhao ; Jing, Qin ; Zhifeng, Fang
Author_Institution :
Sch. of Comput. & Inf. Eng., Shandong Univ. of Finance, Jinan
Abstract :
Two modularized, non-interactive converters are proposed to design applied cryptographic protocols. The converters are based on the refined scheme given by Wenbo Mao, and can transform protocols secure in the ideal model into those secure in the real model. Because the converters are modularized, once proved secure, they can be widely reused in many protocols. And in contrast to BCK-authenticator, the converters have the following advantages: 1, Because of the character of non-interactivity, the transformed protocols outputted by the converters have higher performance than those protocols outputted by BCK-authenticator. 2, The converters can transform some symmetric-key protocols that can not be transformed by BCK-authenticator. 3, The converters have algorithms, which can help to realize automatic transformation.
Keywords :
convertors; cryptographic protocols; BCK-authenticator; converters; cryptographic protocols; symmetric-key protocols; Algorithm design and analysis; Cryptographic protocols; Cryptography; Design engineering; Embedded computing; Finance; Mathematics; Pervasive computing; Security; Ubiquitous computing; BCK-authenticator; converter; cryptographic protocols; refined scheme;
Conference_Titel :
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3492-3
DOI :
10.1109/EUC.2008.18